Patch Series

Subject bpf: prevent offloaded programs from running on host via tcx/netkit
Author jiayuan.chen@linux.dev
Date 2026-04-24 10:41:40 +0000 UTC
Version
Cc andrew@lunn.ch andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net davem@davemloft.net dddddd@hust.edu.cn dzm91@hust.edu.cn eddyz87@gmail.com edumazet@google.com hawk@kernel.org horms@kernel.org jiayuan.chen@linux.dev john.fastabend@gmail.com jolsa@kernel.org krikku@gmail.com kuba@kernel.org kuniyu@google.com linux-kernel@vger.kernel.org liuhangbin@gmail.com m202472210@hust.edu.cn martin.lau@linux.dev memxor@gmail.com netdev@vger.kernel.org pabeni@redhat.com razor@blackwall.org sdf@fomichev.me skhawaja@google.com song@kernel.org toke@redhat.com willemb@google.com yonghong.song@linux.dev

Patches (3)

Name Content [All]
[PATCH bpf v2 1/3] bpf, tcx: reject offloaded programs on attach [Body]
[PATCH bpf v2 2/3] bpf, netkit: reject offloaded programs on attach [Body]
[PATCH bpf v2 3/3] bpf, xdp: reject offloaded programs on link update [Body]
Session 2026-04-24
ID (for dev) 82430048-e1b2-4bdc-887a-6a9c855c9407
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 15513eefac7ca68602e9de9853f5e671bf7b4eef [Config] passed [Log]
[KASAN] Boot test: Base 15513eefac7ca68602e9de9853f5e671bf7b4eef [Config] passed [Log]
[KASAN] Build Patched 15513eefac7ca68602e9de9853f5e671bf7b4eef [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 15513eefac7ca68602e9de9853f5e671bf7b4eef [Config] [patched] passed [Log]
[KASAN] Fuzz 15513eefac7ca68602e9de9853f5e671bf7b4eef [Config] 15513eefac7ca68602e9de9853f5e671bf7b4eef [Config] [patched] passed [Log] [Artifacts]